Blog

In Just 24 hours, 5,000 Android Devices are Conscripted into Mining Botnet

Posted by on February 6,2018

Via Ars Technica: A new internet worm emerged over the weekend that took less than 24-hours to infect Android devices such a smartphones and TV boxes. Once infected, the devices began mining the Monero brand of crypto-currency, and seeking additional devices to infect: Once infected, Android phones and TV boxes scan networks for other devices […]

Read More

More Than 2000 WordPress Sites Found to be Infected With Key-Logging Malware

Posted by on January 30,2018

The security desk at Ars Technica is reporting on a new attack where more than 2000 WordPress sites were infected with malware that can capture keystrokes (and passwords) within the administrative control panel. It also installs an in-browser crypto-currency miner that hijacks the computers of site visitors to run silently in the background. Side effects […]

Read More

Meltdown and Spectre: The Pain Has Only Just Begun

Posted by on January 12,2018

Ars Technica has published an excellent in-depth article detailing how the upcoming software and hardware patches designed to deal with the Meltdown and Spectre vulnerabilities will likely have a negative impact on computer performance. To recap: modern high-performance processors perform what is called speculative execution. They will make assumptions about which way branches in the code […]

Read More

Just-Tech Will Be the LSC Innovations in Technology Conference

Posted by on January 9,2018

Heading down to New Orleans for LSC’s Innovations in Technology Conference this week? Be sure to be on the lookout for Just-Tech’s Founder and President, John Greiner, and Senior Consultant, Anna Steele. On Tuesday, Anna will be participating in the pre-conference hackathon, and John will be joining members of the legal services technology community in […]

Read More

I.T. Spending versus Budgeting

Posted by on January 2,2018

As a IT professional, working for many different types of companies and organizations, you get the feeling you’re a bird on the window sill, peering in, observing the culture, watching the daily workflow; not fully understanding it, yet somehow a part of it, unseen in the background. Over the course of the past twenty years, […]

Read More

Critical Vulnerability Patched in Mozilla Thunderbird

Posted by on December 27,2017

Via Ars Technica: Mozilla has recently released a major upgrade to the Thunderbird email client that addresses a critical buffer-overflow vulnerability that was discovered earlier this year: The bug, rated critical by the Mozilla Foundation, is CVE-2017-7845, which is a buffer overflow vulnerability affecting only Windows users. “A buffer overflow occurs when drawing and validating […]

Read More

Westlaw: Blockchain 101

Posted by on November 3,2017

Thomson Reuters (aka: Westlaw) has a introductory primer up on the increased use of blockchain technologies in both the financial and legal sectors. Blockchain 101 [Note: The article is partially pay-walled, so to read the full piece you will need a Westlaw login.]

Read More

Excel Tips: Using Colors

Posted by on November 2,2017

Most folks want visual clues to make things easier to read and to comprehend. Our brains can identify and process visual clues many times faster than they can process text or numeric information. Using colors in spreadsheets can not only help us navigate, they can also facilitate comprehension. There are a lot of different techniques […]

Read More

New Ransomware, Dubbed “Bad Rabbit”, Strikes Europe

Posted by on October 25,2017

Endgadget is reporting on a new malware attack underway in in Europe. Dubbed “Bad Rabbit”, the attack takes advantage of widely known flaws in Adobe’s Flash product to trick users into downloading a fake update from a compromised web site. Once installed, the update encrypts user files, rendering them inaccessible until a ransom demand of […]

Read More

KRACK Attack Opens Your Wi-Fi Networks to Snooping

Posted by on October 17,2017

Mathy VanHoef, a researcher with the imec-DistriNet Research Group at University of Leuven, Belgium has released a paper titled Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2 which details a major vulnerability in the WPA2 wireless security protocol. Per VanHoef’s release notes: [A]ttackers can use this novel attack technique to read information that was previously […]

Read More